ntlm-relay-coercion

Fail

Audited by Socket on Apr 9, 2026

2 alerts found:

Malwarex2
MalwareHIGH
COERCION_METHODS.md

This fragment is explicitly an offensive, actionable playbook for NTLM authentication coercion and relay-based Active Directory compromise, including identity/authorization-impact outcomes (RBCD, shadow credentials, ADCS relay, and DCSync-style effects). There is no indication of benign functionality; it is best treated as high-malicious-content supply-chain risk if present in a dependency.

Confidence: 82%Severity: 100%
MalwareHIGH
SKILL.md

MALICIOUS: the skill’s footprint is fundamentally offensive and centers on credential capture, relay, coercion, and privilege escalation against Active Directory targets. The tooling references are mostly legitimate red-team tools, so this is not mainly a supply-chain scam, but the skill is incompatible with benign assistant use because it teaches and enables network intrusion and post-auth abuse.

Confidence: 95%Severity: 96%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fntlm-relay-coercion%2F@636d169efa9fef5451b68de4aee4b5c1807db016